summaryrefslogtreecommitdiffstats
path: root/crypto/param_build_set.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-03-05CI external tests: separate each external test into its own phaseTomas Mraz1-2/+8
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/14416)
2021-03-05CI external test: for now run only the krb5 and gost_engine testsTomas Mraz1-1/+1
The boringssl (https://github.com/openssl/openssl/issues/14424) and pyca-cryptography (https://github.com/openssl/openssl/issues/14425) tests are currently broken. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/14416)
2021-03-05gost_engine test: further cleanups and fixesTomas Mraz1-13/+12
Allow absolute paths for $SRCTOP and $BLDTOP. Do not build the gost_engine in tree. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/14416)
2021-03-05gost_engine test: Run also perl and tcl testsTomas Mraz2-13/+29
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/14416)
2021-03-05CI: add job with external testsTomas Mraz5-1/+20
Update gost-engine submodule. Update pyca-cryptography submodule. Fix condition for skipping krb5 test. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/14416)
2021-03-04DOCS: Document OSSL_STORE_INFO_PUBKEY in doc/man3/OSSL_STORE_INFO.podRichard Levitte1-1/+5
Fixes #14414 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14415)
2021-03-04Make provider provider_init thread safe, and flag checking/setting tooRichard Levitte1-11/+35
provider_init() makes changes in the provider structure, and needs a bit of protection to ensure that doesn't happen concurrently with race conditions. This also demands a bit of protection of the flags, since they are bits and presumably occupy the same byte in memory. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14354)
2021-03-04Make ossl_provider_disable_fallback_loading() thread safeRichard Levitte1-0/+2
Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14354)
2021-03-04test/threadstest.c: Add a test to load providers concurrentlyRichard Levitte1-0/+29
If we don't synchronize properly in the core provider code, and build with a thread sanitizer, this should cause a crash. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14354)
2021-03-04ecx_set_priv_key: Try to obtain libctx from the pkey's keymgmtTomas Mraz1-4/+15
We can try to do that although for legacy keys the keymgmt will not be set. This function will disappear with legacy support removed. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04bn_ctx.c: Remove TODO 3.0 related to tracing in FIPS moduleTomas Mraz1-1/+1
We do not want tracing in the FIPS module. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04ecx_set_priv_key: Remove TODO 3.0 related to setting libctxTomas Mraz1-1/+0
This function is used only for legacy keys so the TODO is not relevant. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04do_sigver_init: Remove fallback for missing provider implementations.Tomas Mraz1-11/+0
We now have everything implemented in providers. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04Remove some of the TODO 3.0 in crypto/evp related to legacy support.Tomas Mraz4-31/+33
The legacy support stays in 3.0. The TODOs are dropped. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04crypto/param_build_set.c: Remove irrelevant TODO 3.0Tomas Mraz1-1/+0
The OSSL_PARAM_set_BN() pads to data_size so there is no need for OSSL_PARAM_set_BN_pad(). Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04crypto/ppccap.c: Remove useless TODO 3.0Tomas Mraz1-4/+0
The chacha and poly1305 algorithms are not FIPS approved so they should stay out of FIPS module. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04include/crypto: Remove TODOs that are irrelevant for 3.0Tomas Mraz2-5/+3
The legacy support will not be removed in 3.0. Remove the related TODO 3.0 marks. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04include/internal: Remove TODOs that are irrelevant for 3.0Tomas Mraz2-2/+2
The sha3 and sm3 legacy support requires these headers. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14404)
2021-03-04test/x509: Test for issuer being overwritten when printing.Tomas Mraz4-106/+95
The regression from commit 05458fd was fixed, but there is no test for that regression. This adds it simply by having a certificate that we compare for -text output having a different subject and issuer. Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/14353)
2021-03-04OSSL_STORE: restore diagnostics on decrypt error; provide password hintsDr. David von Oheimb4-11/+24
Fixes #13493 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13525)
2021-03-04crypto: rename error flags in internal structuresTobias Nießen6-33/+33
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14405)